A new biometric identity based encryption scheme secure against DoS attacks

被引:11
|
作者
Sarier, Neyire Deniz [1 ]
机构
[1] Bonn Aachen Int Ctr Informat Technol, Comp Secur Grp, D-53113 Bonn, Germany
关键词
biometrics; fuzzy IBE; fuzzy extraction; DoS attack; SIGNATURES; EFFICIENT;
D O I
10.1002/sec.162
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Sarier [1] proposed an efficient biometric Identity Based Encryption (IBE) scheme called BIO-IBE using the Sakai Kasahara Key Construction and proved its security in the Random Oracle Model (ROM) based on the well-exploited k-BDHI computational problem. Despite its efficiency compared to other fuzzy IBE systems implemented for biometric identities, BIO-IBE is not secure against a new type of denial of service (DoS) attack that we present. In this context, we describe a new biometric IBE scheme and show that our scheme is immune against this attack due to the signature applied on the public value PAR of the user. This way, the sender can detect whether PAR of the receiver that is stored publicly is modified by an active adversary, thus the generation of a ciphertext based on a wrong identity is avoided. The main difference of the new scheme is the structure of the key generation algorithm, where a unique biometric identity string ID obtained from the biometric attributes is used instead of picking a different polynomial for each user as in other fuzzy IBE schemes. In addition to the well-defined security model for current fuzzy IBE schemes, we describe a stronger security model and prove the security of our scheme in this framework achieving a better reduction cost compared to BIO-IBE. Finally, our scheme provides security against DoS attacks and better efficiency in terms of the key generation and decryption algorithms compared to the existing fuzzy IBE schemes. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:23 / 32
页数:10
相关论文
共 50 条
  • [21] A Generic Construction of CCA-secure Identity-based Encryption with Equality Test against Insider Attacks
    Emura, Keita
    Takayasu, Atsushi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105 (08)
  • [22] A Generic Construction of CCA-Secure Identity-Based Encryption with Equality Test against Insider Attacks
    Emura, Keita
    Takayasu, Atsushi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (03) : 193 - 202
  • [23] A Forward Secure Identity Based Encryption Scheme with Master Key Update
    Yang, Peng
    Matsuura, Kanta
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 336 - 341
  • [24] A Router Based Packet Filtering Scheme for Defending Against DoS Attacks
    Lu Ning
    Su Sen
    Jing Maohua
    Han Jian
    CHINA COMMUNICATIONS, 2014, 11 (10) : 136 - 146
  • [25] CCA-Secure Deterministic Identity-Based Encryption Scheme
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Liang, Kaitai
    Xue, Liang
    Yang, Xiaoyi
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 245 - 269
  • [26] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [27] A New Special Biometric Identity Based Signature Scheme
    Liu, Xiaodong
    Miao, Quan
    Li, Daxing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (01): : 13 - 18
  • [28] Event-Based Secure Consensus of Mutiagent Systems Against DoS Attacks
    Xu, Yong
    Fang, Mei
    Shi, Peng
    Wu, Zheng-Guang
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (08) : 3468 - 3476
  • [29] Improved public key encryption scheme secure against adaptive chosen-ciphertext attacks
    Chen, Min-Rong
    Zhang, Xi
    He, Kai
    Guan, Chao-Wen
    Liu, Dan
    Jisuanji Xuebao/Chinese Journal of Computers, 2013, 36 (06): : 1149 - 1154
  • [30] Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity
    Abdelfatah, Roayat Ismail
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (05)